Role of Steering Inequality In Quantum Key Distribution Protocol
- URL: http://arxiv.org/abs/2106.12759v2
- Date: Thu, 15 Dec 2022 04:41:07 GMT
- Title: Role of Steering Inequality In Quantum Key Distribution Protocol
- Authors: Kaushiki Mukherjee, Tapaswini Patro and Nirman Ganguly
- Abstract summary: Violation of Bell's inequality has been the mainspring for secure key generation in an entanglement assisted Quantum Key Distribution protocol.
We show that the violations of the CJWR can act as key ingredients in an entanglement assisted QKD protocol.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Violation of Bell's inequality has been the mainspring for secure key
generation in an entanglement assisted Quantum Key Distribution(QKD) protocol.
Various contributions have relied on the violation of appropriate Bell
inequalities to build an appropriate QKD protocol. Residing between Bell
nonlocality and entanglement, there exists a hybrid trait of correlations,
namely correlations exhibited through the violation of steering inequalities.
However, such correlations have not been put to use in QKD protocols as much as
their stronger counterpart, the Bell violations. In the present work, we show
that the violations of the CJWR(E.G.Cavalcanti,S.J. Jones,H.M Wiseman and M.D.
Reid, Phys.Rev.A 80,032112(2009))steering inequalities can act as key
ingredients in an entanglement assisted QKD protocol. We work with arbitrary
two qubit entangled states, characterize them in accordance with their utility
in such protocols. The characterization is based on the quantum bit error rate
and violation of a CJWR inequality. Furthermore, we show that subsequent
applications of local filtering operations on initially entangled states
exhibiting non violation, lead to violations necessary for the successful
implementation of the protocol. An additional vindication of our protocol is
provided by the use of absolutely Bell-CHSH local states, states which remain
Bell-CHSH local even under global unitary operations.
Related papers
- The Road to Near-Capacity CV-QKD Reconciliation: An FEC-Agnostic Design [53.67135680812675]
A new codeword-based QKD reconciliation scheme is proposed.
Both the authenticated classical channel (ClC) and the quantum channel (QuC) are protected by separate forward error correction (FEC) coding schemes.
The proposed system makes QKD reconciliation compatible with a wide range of FEC schemes.
arXiv Detail & Related papers (2024-03-24T14:47:08Z) - A Secure Quantum Key Distribution Protocol Using Two-Particle Transmission [0.0]
Unextendible Product Bases (UPBs) hold promise in quantum cryptography due to their inherent indistinguishability.
This work introduces a protocol utilizing UPBs to establish quantum keys between distant parties.
arXiv Detail & Related papers (2024-03-20T14:33:17Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Boosting device-independent cryptography with tripartite nonlocality [0.0]
Device-independent (DI) protocols certify private randomness by observing nonlocal correlations when two or more parties test a Bell inequality.
Here, we consider tripartite DICKA and DIRE protocols based on testing multipartite Bell inequalities.
We show that DICKA and DIRE protocols employing tripartite Bell inequalities can significantly outperform their bipartite counterparts.
arXiv Detail & Related papers (2022-09-26T16:35:03Z) - Device-independent secret key rates via a post-selected Bell inequality [0.0]
We introduce a DIQKD scenario in which an optimal Bell inequality is constructed from the performed measurement data.
We provide an implementable DIQKD protocol and perform finite-size security key analysis for collective attacks.
arXiv Detail & Related papers (2021-11-08T13:17:24Z) - Unbalanced-basis-misalignment tolerant measurement-device-independent
quantum key distribution [22.419105320267523]
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it is physically immune to all attacks on the detection side.
Some protocols release part of the assumptions in the encoding system to keep the practical security, but the performance would be dramatically reduced.
We present a MDIQKD protocol that requires less knowledge of encoding system to combat the troublesome modulation errors and fluctuations.
arXiv Detail & Related papers (2021-08-27T02:16:20Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Entanglement purification by counting and locating errors with
entangling measurements [62.997667081978825]
We consider entanglement purification protocols for multiple copies of qubit states.
We use high-dimensional auxiliary entangled systems to learn about number and positions of errors in the noisy ensemble.
arXiv Detail & Related papers (2020-11-13T19:02:33Z) - Contextuality based quantum conferencing [0.0]
We propose the procedure for adaptation of nonlocality-based quantum conferencing protocols to contextuality-based QCPs.
Unlike the nonlocality-based protocols, the proposed protocols do not involve nonlocal states.
We show the feasibility of experimental implementation of these protocols with orbital angular momentum (OAM) states.
arXiv Detail & Related papers (2020-11-09T06:16:31Z) - Upper bounds on device-independent quantum key distribution rates and a
revised Peres conjecture [11.523471275501855]
Device-independent quantum key distribution (DIQKD) is one of the most challenging tasks in quantum cryptography.
We study the entanglement needed for DIQKD protocols in two different ways.
arXiv Detail & Related papers (2020-05-25T18:21:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.